Abstract

ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as … For more content click the Read More button below.

Syllabus

Introduction to computer and network securityCryptography and its applications in network securitySecret key (symmetric) algorithmsPublic key (asymmetric) algorithmsModes of operationRSA algorithmAuthentication systemsTLS and IP securityUser authentication & KerberosKey Management & Public key infrastructure (PKI)Emerging trends and challenges of network security

Learning outcomes

Upon successful completion of this subject, students should:
1.
be able to identify and explain the various digital threats to IT networks and computing devices;
2.
be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security;
3.
be able to compare and contrast the features of various authentication protocols;
4.
be able to design security solutions using existing authentication protocols;
5.
be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
6.
be able to investigate and evaluate the current and emerging trends in cryptography and network security; and
7.
be able to propose mitigating techniques against cryptographic and network security threats.

Assumed knowledge

ITC595 Information Security

Enrolment restrictions

Only available to postgraduate students.